The internet began as a computer network commissioned by the Advanced Research Projects Agency in 1969 as a network between four universities. Because of the volume of information available and the potential value of instant information transmission, the network known as the internet grew exponentially (Kristula 2). With the increased usage of the internet, has come an increased throughput of information. Contained within the transmitted data are many business secrets and a great deal of personal financial information. The potential offered by this "gold mine" has attracted an ever-increasing amount of attention, and the data are now being sought by many. People who attempt to exploit the internet by illegally accessing unauthorized information have become known as hackers. These hackers pose a great threat to the internet and its users, and their motivation and methods have become the subject of media attention and close scrutiny.

English: FBI Mobile Command Center in Washington D...

English: FBI agents from the Washington Field Offi...

FBI Badge & gun.

While there are no common demographic profiles of hackers, there does appear to be a commonality of attitudes and behavior (Pfleeger 13). For a hacker the computer alone provides the entertainment. Any hole that is found in a system is a thrill, and the correction of the problem often presents the hacker with an interesting puzzle (Himanen 1). There are two major kinds of hackers. The first type of hacker locates system holes to fix them (Pfleeger 12). The second type of hacker searches for a problem within a system to exploit it. For both types the finding of a problem means excitement (Himanen 2). Many hackers tend to be rather cynical and arrogant in their outlook. They also do not believe anything they are doing is wrong (Mentor 1). A popular hacker, whose screen name is Mentor, demonstrated this attitude very clearly. While speaking on a certain...

Citation styles:

Internet Hackers - Methods to the "Madness"; This is an essay which details much of the techniques used by modern hackers, as well as their motives for such actions.. (2002, December 15). In WriteWork.com. Retrieved 20:05, May 24, 2018, from https://www.writework.com/essay/internet-hackers-methods-madness-essay-which-details-much

WriteWork contributors. "Internet Hackers - Methods to the "Madness"; This is an essay which details much of the techniques used by modern hackers, as well as their motives for such actions." WriteWork.com. WriteWork.com, 15 December, 2002. Web. 24 May. 2018.

WriteWork contributors, "Internet Hackers - Methods to the "Madness"; This is an essay which details much of the techniques used by modern hackers, as well as their motives for such actions.," WriteWork.com, https://www.writework.com/essay/internet-hackers-methods-madness-essay-which-details-much (accessed May 24, 2018)

Reviews of: "Internet Hackers - Methods to the "Madness"; This is an essay which details much of the techniques used by modern hackers, as well as their motives for such actions.":

More Computer Science essays:

... Internet, he or she is not only accessing the host computer, but the many computers that connect the host and the user. When a person transmits credit card information, it goes over many computers before it reaches its destination. An illegal hacker can set up one of the connecting computers ...

... information at the device. The information is viewed as a logical database, called a Management Information Base, or MIB. MIB modules describe MIB variables for a large variety of device types, computer hardware, and software components. The original MIB for Managing a TCP/IP internet ...

... of open software for linking people and information over enterprise networks and the Internet . Netscape Communications Corporation is based in Mountain View California. Netscape is a Web browser. The Web enables users to access online information. Today's internet is a wonderful piece of ...

... hacker can gain access to personal information (Quittner 44). Credit bureaus are aware of how financial information can be used or changed by computer hackers, which has a serious impact on their customers. Loans can be made with false information (obtained by the hackers ...

... of conversations or dealings. The availability of the Internet to trade on this information to a larger market base I believe does even the playing for a lot of people who do invest. I don't believe that those who would use the Internet for financial information ...

19 pages473Dec/19963.4

Students & Profs. say about us:

"Good news: you can turn to other's writing help. WriteWork has over 100,000 sample papers"